Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for constructing a file derivative graph

A construction method and a technology of derived graphs, applied in the field of information security, can solve the problem of time-consuming and labor-intensive, unable to locate the equipment or employees that leak sensitive files, etc.

Active Publication Date: 2022-04-19
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing anti-leakage strategy cannot guarantee that all sensitive files will not be leaked. When sensitive files are leaked, in order to take remedial measures against the devices or employees who leaked sensitive files, such as downloading patches or warning employees, it is usually necessary to locate the leaked sensitive files first. equipment or staff
[0003] However, none of the existing anti-leakage strategies can locate the devices or employees that leaked sensitive files. Enterprises can only check all devices and employees in the enterprise one by one when sensitive files are leaked, which is time-consuming and labor-intensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for constructing a file derivative graph
  • A method and device for constructing a file derivative graph
  • A method and device for constructing a file derivative graph

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Many devices in an enterprise contain private data, i.e. sensitive files, such as trade secret files or employee privacy files, that businesses do not want to leak and that need to be transferred between devices within the enterprise for use in performing business operations. As a result, enterprises have a leak-proof security requirement for these sensitive files, so that these sensitive files can be transferred between internal devices without leaking to the outside world.

[0040] In order for these sensitive files not to be leaked, there are many imperfect leak prevention strategies, for example, there are anti-leak programs installed on every device in the enterprise, and the anti-leakage program records a numerical summary of the contents of all sensitive files. When an employee copies or sends a file on an internal device, the leak prevention program calculates a numeric summary of the file's contents, verifies that the digital summary of the content is the same as t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This specification discloses a method and device for constructing a file derived graph. The method includes performing the following graph initialization operations for any file to be monitored: creating a file node F0 corresponding to the current version of the file, determining a device node D (F0) corresponding to the current storage device of the current version, creating F0 and D (F0); after monitoring the preset file derivation operation, perform the following graph update operation for the derivation operation: create a file node Fn corresponding to the derivation version, and determine according to the current storage device of the derivation version Corresponding device node D (Fn); create an edge between Fn and D (Fn), create an edge between Fn-1 and Fn, and the Fn-1 is the file node corresponding to the version before derivation. This method constructs a file derivative graph through model construction, which is used to represent the storage relationship between files and storage devices, so that devices that store files containing private data can be located, thereby locating devices that leak private data.

Description

Technical field [0001] Embodiments of the present specification relate to the field of information security, in particular to a method and apparatus for constructing a file derivative diagram. Background [0002] Many devices in an enterprise contain sensitive files, such as trade secret files or privacy files, for which they have leak-proof security requirements that allow these sensitive files to be transferred between devices within the enterprise without leaking to the outside world. In order for these sensitive files not to be leaked, there are many anti-leak strategies. However, existing anti-leak policies cannot guarantee that all sensitive files will not be leaked, and when sensitive files are leaked, in order to develop remedial actions against the device or employee who leaked the sensitive file, such as downloading patches or warning employees, it is often necessary to locate the device or employee who leaked the sensitive file first. [0003] However, existing leak p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/10G06F21/60G06F16/16
CPCG06F21/10G06F21/602G06F16/16
Inventor 金波
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products